Traffic Engineering with AIMD in MPLS Networks?

Size: px
Start display at page:

Download "Traffic Engineering with AIMD in MPLS Networks?"

Transcription

1 Traffic Engineering with AIMD in MPLS Networks? Jianping Wang 1, Stephen Patek 2, Haiyong Wang 1, and Jörg Liebeherr 1 1 Department of Computer Science 2 Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904, U.S.A. fjgwang@cs,hw6h@cs,jorg@cs,patekg@virginia.edu Abstract. We consider the problem of allocating bandwidth to competing flows in an MPLS network, subject to constraints on fairness, efficiency, and administrative complexity. The aggregate traffic between a source and a destination, called a flow, is mapped to label switched paths (LSPs) across the network. Each flow is assigned a preferred ( primary ) LSP, but traffic may be sent to other ( secondary ) LSPs. Within this context, we define objectives for traffic engineering, such as fairness, efficiency, and preferred flow assignment to the primary LSP of a flow ( Primary Path First, PPF). We propose a distributed, feedbackbased multipath routing algorithm that attempts to apply additive-increase and multiplicative-decrease (AIMD) to implement our traffic engineering objectives. The new algorithm is referred to as multipath-aimd. We use ns-2 simulations to illustrate the fairness criteria and PPF property of our multipath-aimd scheme in an MPLS network. 1 Introduction Multiprotocol Label Switching (MPLS) [20] has offered new opportunities for improving Internet services through traffic engineering. An important aspect of traffic engineering, defined as that aspect of Internet network engineering dealing with the issue of performance evaluation and performance optimization of operational IP networks [4], is the allocation of network resources to satisfy an aggregate measure of the demand for services and to obtain better network utilization. MPLS, in conjunction with path establishment protocols such as CR-LDP [2] or RSVP-TE [8], makes it possible for network engineers to set up dedicated label switched paths (LSPs) with reserved bandwidth for the purpose of optimally distributing traffic across a given network. Figure 1 illustrates an MPLS network, where all traffic across the network is accounted for by a set of source/destination pairs, called flows, and multiple LSPs are in place for accommodating the demand for service. We consider a multipath routing scenario where sources can make use of multiple LSPs. For each source, one LSP is assigned as the primary path, and other LSPs can be used as secondary paths. We consider sets of sources where each source can use all primary paths of the other sources? This work is supported in part by the National Science Foundation through grants ANI , ECS (CAREER), ANI , DMS , and ANI

2 2 PfHSN 2002 source 1 destination 1 source 1 LSP 1 source 2 Cloud destination 2 source 2 LSP 2 source 3 destination 3 source 4 destination 4 source 3 LSP 3 Ingress Nodes Egress Nodes source 4 LSP 4 Fig. 1. An example of an MPLS network. The primary paths are indicated as thick lines. Fig. 2. The simplified network model. LSP i is the primary path for source i. as its secondary paths. While Figure 1 presents a general view of an MPLS network, we concentrate in this paper on a simplified model, as illustrated in Figure 2. To begin, we assume that there are N sources and N LSPs, each serving as the primary path associated with exactly one source. In this context, the traffic engineering problem is the assignment of traffic ofaflow to the primary path and the secondary paths, in such a way that a given set of traffic engineering objectives is satisfied. While a centralized solution to the given problem is quite straightforward, we strive to find distributed mechanisms for traffic engineering without central control. Specifically, we investigate if and to which degree binary feedback schemes and rate control schemes, such as, additive increase/multiplicative decrease (AIMD) [5, 6, 10 12, 19], can be used to achieve traffic engineering objectives. Recently, considerable effort has been invested into scalable mechanisms for providing differentiated services in the Internet. For example, in [7], Elwalid et al. presented a multi-path adaptive traffic engineering mechanism, called MATE, designed for MPLS networks where several explicit LSPs have been established between ingress and egress nodes. MATE is intended to work for traffic that does not require bandwidth reservation and seeks to distribute traffic across the LSPs by dynamically adjusting the rate on each ingress node. The relationships between end-to-end congestion control and fairness are established in [9, 14, 15, 17, 18, 21]. The network model adopted in these papers supposes that all sources are greedy and each source sends traffic through a single path or a dedicated set of paths, and fairness is characterized by means of a social welfare-type optimization objective. These models generally give rise to differential equations that characterize the behavior of AIMD and AIPD 3 congestion control schemes. Different from most of the related work on fairness and binary feedback, we consider sources as being either greedy or non-greedy. A source is greedy if it always has traffic backlogged. A non-greedy source has an upper bound on the desired sending rate. Moreover, we model LSPs as being either pooled or owned. In the owned case, each LSP gives high priority to the source for which the path is primary, and any remaining 3 additive-increase / proportional-decrease

3 PfHSN capacity is available to be shared equally among the remaining sources. In the pooled case, primary paths do not give priority to their respective sources. In this paper, we propose congestion control mechanisms for dynamically adjusting the rates of all sources. In contrast to [9, 14, 15, 17, 18, 21], in an effort to minimize overhead and processing complexity, we only employ binary feedback mechanisms in adjusting flow rates. The feedback mechanisms we have developed seek to address the following traffic engineering characteristics. Efficiency. An allocation of network resources is said to be efficient if either all resources are completely consumed while the network is overloaded or all sources are completely satisfied while the network is underloaded. Fairness. The appropriate notion of fairness for MPLS traffic engineering varies with the nature of sources (greedy vs. non-greedy) and LSPs (pooled vs. owned). In Section 2, we formally define the corresponding fairness criteria for each case, based on the notion of fair-share resource allocation in [3]. With N greedy sources and N pooled resources, it is easy to prove the equivalence between our definition and the minimum potential delay fairness from [16, 18]. However, our fairness definitions are constructive, providing an easier way to characterize and achieve fair allocations than through the solution of nonlinear optimization models. Primary Path First Property. While routing along multiple paths is an opportunity we seek to exploit, there are drawbacks associated with multi-path routing, such as overhead associated with label distribution, additional state information, classification, and potential out-of-sequence delivery. To address these issues, we formulate a traffic engineering objective that seeks to minimize the amount of traffic sent over secondary paths. We introduce a novel criteria for network performance, called the Primary Path First (PPF) property. Generally speaking, PPF refers to the desire to have each source exploit available capacity on secondary paths, but to refrain from using the secondary paths whenever possible. We make this notion precise in Section 3. The PPF property reflects that, given multiple feasible rate assignments to primary and secondary paths that satisfy fairness and efficiency criteria, the preferred assignment is the one that sends the most traffic of a source on the primary path of that source. Distributed Implementation. We seek to provide efficient, fair, and PPF allocations of network resources using simple distributed algorithms. Distributed mechanisms, which operate mainly on local state information, are preferred as they minimize network overhead and retain scalability. In Section 4, we describe a distributed scheme which allocates flow to resources in a fashion reminiscent of AIMD in [13]. In some cases, global information and coordination are required for specific goals such as PPF. Stability and Convergence. Traffic engineering mechanisms, such as those we seek to develop in this paper, often suffer from potential instability and oscillations within the network. We seek to prevent this type of behavior by requiring incremental adjustments to the flow allocations specified by our algorithms. However, in this paper we do not offer a formal proof of stability or convergence properties.

4 4 PfHSN 2002 This paper makes two contributions. First, we introduce notions of fairness for MPLS traffic engineering, and we show how the AIMD algorithm of [13] can be extended, in a distributed fashion, to achieve fair allocations of network resources. We call the enhanced AIMD algorithm multipath-aimd. Next, we introduce the PPF criterion which seeks to limit the administrative complexity associated with multipath-routing, by concentrating traffic on a designated LSP. The reminder of this paper is organized as follows. Section 2 formally defines notions of fairness for both pooled and owned resources. Section 3 defines and analyzes the PPF criterion. Section 4 presents AIMD algorithms which experimentally converge to fair allocations of network capacity and suggests modifications to the AIMD schemes for achieving a PPF assignment of resources. Section 5 presents ns-2 simulation results, and Section 6 concludes the paper. 2 Fairness Criteria We consider a network of LSPs which correspond to the simplified model of Figure 2. In this model, there are N traffic sources and N LSPs. At any time, each source i = 1 ::: N has a load of i ( i 0), which is the maximum desired sending rate of the source. If the traffic demand from source i is i = 1, we say that the source is greedy. 4 Each LSP i =1 ::: N has a maximum transmission capacity of B i. LSP i is the primary path associated with source i, and all other LSPs are secondary paths with respect to source i. We use i to denote the actual allocation of bandwidth to source i. The rate allocation consists of the allocation on the primary path and the secondary paths. We distinguish two different allocation schemes for assigning bandwidth on the LSPs to sources: Owned Resources: Each source may consume the entire capacity of its primary path, i.e., B i, and, in addition, it can obtain unused bandwidth on its secondary paths. P N Pooled Resources: The aggregate capacity on all LSPs, i.e., B i=1 i, is distributed across all sources, without regard to the capacity on primary paths. The fairness criteria for networks with owned and pooled resources are specified in the following definition. Definition 1. Given a network as shown in Figure 2 with N sources and LSPs. Let B i denote the capacity of LSP i (1 i N), and let i 0 and i 0 denote the load and the rate allocation of source i. 1. A rate allocation is a relation R = ( i, i ), 1 i N such that both i i and 0 P N i=1 i P N i=1 B i. 4 Note that the values of i vary with time; However, we do not carry the dependence on time in our notation, i.e., by writing i(t).

5 2. A rate allocation is efficient if the following hold: a) If P N i=1 i < P N i=1 B i, then P N i=1 i = P N PfHSN P P P P i=1 i N b) If N i=1 i B N i=1 i, then N i=1 i = B i=1 i: If case b) holds, we say that the rate allocation is saturating. 3. A rate allocation for pooled resources is fair if there exists a value p > 0 such that for each source i it holds that i = minf i p g: 4. A rate allocation for owned resources is fair if there exists a value o > 0 such that for each source i it holds that i = minf i B i + o g: According to this definition, a rate allocation is fair if sources with low bandwidth requirements are fully satisfied while sources with high requirements obtain a fair share of the capacity according to the given fairness criteria. With pooled resources, the fair allocation to a given source depends only on the rate requirement of the source and the total capacity of all resources. With owned resources, the fair rate allocation takes into consideration the capacity B i on the primary path of source i. As we will discuss below, rate allocations for a network with pooled and owned resources that are fair and satisfy the respective fairness criteria are uniquely defined (with respect to the values of i ). Further, assuming knowledge of the load of all sources and the bandwidth of all LSPs, the rate allocations can be effectively constructed. Later in this paper, we attempt to achieve the desired rate allocations in a distributed fashion via a feedback loop, and without explicit knowledge of the traffic load of the sources. 2.1 Pooled Resources The rate allocation distributes the aggregate capacity from all LSPs across all sources, regardless of the available capacity on the primary path of a source. Hence, the aggregate capacity on all LSPs can be thought of as a single pool of resources. We refer to p as the fair share of this rate allocation. The fair share p in a network with pooled resources is given by where p = 8< : PN i=1 Bi; Pj2U j joj if O 6= 1 otherwise U = fj j j < p g and O = fj j j p g: (2) One can think of U as the set of underloaded sources that can satisfy their bandwidth demands, and of O as the set of overloaded sources. Then, the fair rate allocation is obtained by subtracting the bandwidth demand from underloaded sources, and then dividing the remainder by the number of overloaded sources. If the total demand is less than the total available capacity, i.e., P N i=1 i P N i=1 B i, then all sources are underloaded and p = 1. In the special case where all sources are greedy, i.e. i = 1 for all i =1 ::: N,wehaveU = and i = p = P N i=1 B i=n for all i. (1)

6 6 PfHSN 2002 Efficiency of this rate allocation can be verified by inspection. A proof of the efficiency and the uniqueness of this rate allocation is given in [3], which specifies a rate allocation for a shared bus metropolitan area network. We can construct p as follows. Assume, without loss of generality, that the sources are ordered according to the generated load, that is, i j for i<j. Select ^k has the largest index k (1 k N) which satisfies k Then, we can determine the fair share p by p = 8< P P N B k l=1 l ; l=1 l : (3) N ; k : PN l=1 B l;p^k l=1 l N;^k if ^k <N 1 otherwise : 2.2 Owned Resources Here, each source may consume all of the capacity on its primary path and, in addition, a fair share of the remaining unused capacity on all secondary paths. Hence, since each source can always consume all the resources on its primary path, the capacity of the primary path can be thought of as being owned by the source. For the fairness definition, we distinguish between flows that use the entire bandwidth on the primary path and those that do not: ~U = fj j j <B j g and ~ O = fj j j B j g: (5) Thus, the total surplus capacity, which can be distributed to sources in ~ O, amounts to C 0 = P i2 ~ U (B i ; i ). For a source where the demand is not satisfied by the primary path, i.e., i 2 ~ O,wedefine 0 i = i ; B i. Now the fair share of the surplus is given by ( C 0 ; Pj2U0 0 j (4) o = jo0 j if O 0 6= 1 otherwise (6) where U 0 = fj 2 O ~ j 0 j <o g and O 0 = fj 2 O ~ j 0 j o g: (7) The rate allocation is obtained via i i 2 U ~ or i 2 U 0 i = B i + o i 2 O 0 : (8) Thus, a source either obtains enough bandwidth to satisfy its demand, or it obtains the resources on its primary path and a fair share of the surplus. If all sources are greedy, with owned resources, we have ~ U =, C 0 =0, U 0 =, o =0, and therefore i = B i for i =1 ::: N.

7 PfHSN As with pooled resources, the proofs in [3] can be used to establish the efficiency of the rate allocation. A value for o can be constructed as follows. Assume, without loss of generality, that the sources in ~ O have index 1 2 ::: j ~ Oj, and are ordered according to the generated load, that is, 0 i 0 j for i<jand i j 2 ~ O. Select ^k as the largest index k (1 k j ~ Oj) which satisfies Then, we have o = P 0 k C0 k ; l=1 0 l j Oj;k ~ : (9) 8< : C0;P^k 0 l=1 l j Oj;^k ~ if ^k <j ~ Oj 1 otherwise : 3 The Primary Path First (PPF) Property For each source, the fairness and efficiency criteria presented in the previous section make statements about the total rate allocation to a source, but ignore how traffic is split between the primary path and the secondary paths. From a traffic engineering perspective, a rate allocation that transmits more traffic on the primary paths is more attractive, since routing traffic on secondary paths increases the fraction of out-of-sequence delivered packets, leading to higher administrative complexity. To prevent the multipath routing scheme from spreading traffic across all available paths [21], we formulate an objective for our traffic engineering problem, which we call Primary Path First (PPF). PPF refers broadly to the desire to limit the consumption of secondary paths in the MPLS network. In this paper, we focus on an instantiation of PPF where we seek to minimize the total volume of flow assigned to secondary paths. To make the notion of PPF precise, we refer to a source and its primary path as a source-path pair. An N N matrix M will be called a routing matrix if it describes the global assignment of path capacity to sources, i.e. M (i j) is the amount of traffic sent by source i to path j. Thus, the throughput for source i P P N is i = j=1 M (i j), and the secondary traffic associated with source i is equal to j6=i M (i j). The definition of an assignment of traffic that minimizes the total volume of flow assigned to secondary paths is as follows. Definition 2. Given a saturating rate allocation f( i i ) : i =1 ::: Ng, a routing matrix M is said to be PPF-optimal if it solves the following linear program. (10) P N min i=1pj6=i M (i j) (11) N subject to M (i j=1 j) = i 8 i =1 ::: N P N M (i i=1 j) =B j 8 j =1 ::: N M (i j) 0 8 i j =1 ::: N:

8 8 PfHSN 2002 From this definition, a routing matrix M is PPF-optimal if it achieves the given saturating allocation with minimum total volume of traffic sent along secondary paths. There is unnecessary use of secondary paths if either of the following cases hold. Case 1: There is a sequence (i 1 i 2 i k ) with k > 2 such that M (i 1 i 2 ) > 0, M (i 2 i 3 ) > 0, :::, M (i k;1 i k ) > 0. We call such a sequence a chain. Case 2: There is a cycle (i 1 i 2 i k ) with i k = i 1 and k > 2, such that M (i 1 i 2 ) > 0, M (i 2 i 3 ) > 0, :::, M (i k;1 i k ) > 0. With these cases in mind, we can devise a procedure that reduces the total amount of traffic sent on secondary paths without altering the total rate allocation i of any source i. Suppose the rate allocation is saturating and we identify a chain which satisfies the condition in Case 1. We can eliminate the chain, or at least cut the chain into two smaller chains, by setting M (i s i s+1 ) M (i s i s ) M (i s i s+1 ) ; minfm (i t i t+1 ):t =1 ::: k; 1g s =1 ::: k; 1 M (i s i s )+minfm (i t i t+1 ):t =1 ::: k; 1g s =2 ::: k; 1 M (i 1 i k ) M (i 1 i k ) + minfm (i t i t+1 ):t =1 ::: k; 1g: Suppose we identify a cycle which satisfies the condition in Case 2. Then, we can eliminate the cycle by setting M (i s i s+1 ) M (i s i s ) M (i s i s+1 ) ; minfm (i t i t+1 ):t =1 ::: k; 1g M (i s i s )+minfm (i t i t+1 ):t =1 ::: k; 1g for all s =1 ::: k; 1. By adjusting the routing matrix M in this fashion, the cycle disappears, and the total volume of secondary-path traffic is reduced. However, some new shorter chain might be created. By repeating the above steps of eliminating cycles and chains, we reduce the total volume of secondary traffic, and, eventually, obtain a routing matrix where no chains or cycles exist that satisfy the conditions of Case 1 or 2. The following proposition shows that a necessary and sufficient condition for a routing matrix to be PPF-optimal is the absence of chains or cycles that satisfy the conditions of Cases 1 or 2. Proposition 1. Given a saturating rate allocation f( i i ):i =1 ::: ng. A routing matrix M that achieves this allocation is PPF-optimal if and only if there does not exist a chain or cycle as defined above. Proof: (Sufficiency) Consider any routing matrix M that achieves the saturating rate allocation f( P P N i i ) : i = 1 ::: Ng. Since M (i i) B i and M (i j=1 j) = i, we have that M (i j6=i j) maxf i ; B i 0g: Summing this lower bound across all sources, we have that NX X NX i=1 j6=i M (i j) i=1 maxf i ; B i 0g: (12)

9 PfHSN Now consider the routing matrix M described in the statement of the proposition. Since there exist no chains or cycles of source-path pairs that satisfy Case 1 or 2, we can follow that, if a source i sends secondary flow, then path i does not receive secondary flow from any other source. Thus, P k6=i M (k i) = 0. Since the rate allocation is P N saturating, we have that B i = M k=1 (k i), which implies M (i i) =B i, therefore Pj6=i M (i j) = i ;B i = maxf i ;B i 0g: Conversely, if path i receives secondary flow from some other source, then source i itself does P not send secondary flow. Then, Pj6=i M (i j) =0and i = M (i i) B i. Thus, M j6=i (i j) =0=maxf i ; B i 0g. Again, since the rate allocation is saturating, at least one of the two cases above holds for each i =1 ::: N:Thus, NX NX X i=1 maxf i ; B i 0g = which, combined with Equation (12), implies that NX X i=1 j6=i M (i j) i=1 j6=i NX X i=1 j6=i M (i j) (13) M (i j): (14) Consequently, M is PPF-optimal with respect to the saturating rate allocation f( i i ): i =1 ::: Ng. (Necessity) Suppose M is PPF-optimal. If there exists a chain or cycle of sourcepath pairs which satisfies the conditions of either Case 1 or Case 2, then we can reduce the total volume of secondary traffic by reducing the length of the chain or by eliminating the cycle. However, this would contradict the fact that M is PPF-optimal. Thus, PPF-optimality implies no chains or cycles of source-path pairs satisfying the conditions of Case 1 or 2. From the proof, if there is a routing matrix M that achieves the saturating rate allocation P f( i i ) : i = 1 ::: Ng, then a lower-bound of the total secondary-path N traffic is maxf i=1 i ; B i 0g. From the definition of the PPF criterion, we obtain the following corollary: Corollary 1. A routing matrix M is PPF-optimal if it satisfies NX X i=1 j6=i M (i j) = NX i=1 maxf i ; B i 0g : (15) 4 Multipath-AIMD Additive-Increase Multiplicative-Decrease (AIMD) feedback algorithms are used extensively for flow and congestion control in computer networks [5, 6, 11, 10, 12, 19] and are widely held to be both efficient and fair in allocating traffic to network paths. These algorithms adjust the transmission rate of a sender based on feedback from the network following an additive increase/multiplicative decrease rule. If the network is free of

10 10 PfHSN 2002 congestion, the transmission rate of the sender is increased by a constant amount. If the network is congested, the transmission rate is reduced by an amount that is proportional to the current transmission rate. Note that in earlier instantiations of the AIMD rule the sending rate for a given source is adjusted as though only one path exists for end-to-end communication. In this section, we generalize the AIMD rule to account for multiple paths between the sender and the receiver. The resulting algorithm, called multipath-aimd, is intended to provide an efficient and fair mechanism for allocating bandwidth in an MPLS network. We assume that each LSP in the network periodically sends binary congestionstate information to all sources, similar to the DECbit scheme [12]. In the following, we develop two versions of the multipath-aimd algorithm: basic multipath-aimd (cf. Section 4.1) and multipath-aimd with PPF correction (cf. Section 4.2). In the basic multipath-aimd algorithm, each source uses the original AIMD rule to periodically adjust the rate at which it sends traffic along each LSP, providing a simple, distributed scheme for allocating network paths. Our simulation experiments indicate that the basic scheme is very robust, generally converging to an efficient and fair rate allocation within a reasonable interval of time. One undesirable feature associated with basic multipath- AIMD, especially in the case of greedy sources, is that it tends to allocate flow from all sources to all paths, completely ignoring the PPF criterion. Multipath-AIMD with PPF correction seeks to address this issue by modifying the AIMD adjustment on each LSP according to additional binary feedback information which informs sources of opportunities for reducing secondary path traffic. 4.1 Basic Multipath-AIMD The basic multipath-aimd algorithm consists of two parts: a feedback mechanism provided by the network and a rate adjustment mechanism implemented by the sources. The feedback mechanism is similar to the DECbit scheme [12]. Each LSP j =1 ::: N periodically sends messages to all sources containing a binary signal f j = f0 1g indicating its congestion state. Congestion is defined in terms of the capacity B j of LSP j: if the utilization of path j meets or exceeds B j, then the source will receive a signal f j = 1; otherwise the source receives a signal f j = 0. We assume that the source receives signals on the congestion state from each path at regular intervals of length LSP > 0 (a parameter), asynchronously with respect to all other paths. The rate adjustment mechanism is based upon the original AIMD algorithm [13] with a slight modification to account for non-greedy sources. Each source updates its sending rates to all paths at regular intervals of length src > 0 (also a parameter), asynchronously with respect to all other sources. In this mechanism, the most recent feedback signals received and stored by a source are used in the rate adjustments. We usually set src = LSP so that a feedback signal is used by a source only one time. Let x ij denote the rate at which source i sends traffic to path j. The formula for the adjustment depends upon whether resources are pooled or owned, as follows.

11 PfHSN Pooled Resources. Each source i adjusts its sending rate to LSP j based on the received feedback signals according to x ij 8>< >: x N ij + k a if P N x ij if x l=1 il < i and f j =0 x l=1 il i and f j =0 x ij (1 ; k r ) if f j =1: where k a > 0 and k r 2 (0 1] are the additive increase and multiplicative decrease parameters, respectively, and where f j is the latest congestion signal received for LSP j. Owned Resources. There are two cases to consider. First, if the desired sending rate of source i does not exceed the capacity of its primary path, i.e. i B i, then it adjusts its rate to LSP i according to minfxii + k a i g if x ii i x ii (17) x ii (1 ; k r ) if x ii > i : Note that no flow is ever assigned from source i to any other LSP j 6= i. For sources i that demand more than the capacity of their primary paths, i.e. i >B i, then, after receiving feedback signals from all paths, source i adjusts its sending rate according to (16) and for j 6= i x ii minfx ii + k a B i g (18) 8>< >: x ij if (x ii <B i) P P N or (x ii = B i N x ij + k a if x ii = B i x l=1 il i and f j =0) x ij x l=1 il < i and f j =0 x ij (1 ; k r ) if x ii = B i and f j =1: (19) Thus, in the owned case, a source never sends traffic to secondary paths before it makes full use of its primary path. Moreover, the traffic sent from a source to its primary path is independent of traffic sent from other sources. 4.2 Multipath-AIMD with PPF Correction In the case of owned paths, the basic multipath-aimd algorithm requires all sources to consume first the capacity of their respective primary paths, and secondary paths are utilized only when the primary paths are insufficient to meet the desired sending rate. As a result, the basic multipath-aimd algorithm automatically produces PPFoptimal routing matrices. However, this is not the case for pooled resource. Therefore, to enforce the PPF criterion for pooled resources, we develop an alternative algorithm, called multipath-aimd with PPF correction. As with the basic scheme, multipath-aimd with PPF correction consists of a feedback mechanism and a rate adjustment mechanism. As before, multipath-aimd with PPF correction takes binary feedback f j = f0 1g from all LSPs. However, in this case, extra feedback information is required to allow the sources to coordinate in attempting to reduce the total volume of secondary traffic. Each source i = 1 ::: N

12 12 PfHSN 2002 periodically sends messages to all other sources containing a binary (routing) vector m i = (m i1 ::: m in ), where m ij = 1 if source i is currently sending traffic to LSP j, and m ij = 0 otherwise. Each source i retains the routing vector m j associated with all other sources and uses this information to modify the basic AIMD update of Equation (16). Each source transmits its routing vector at regular intervals of length PPF > 0 (a parameter), asynchronously with respect to all other sources. The rate adjustment mechanism for multipath-aimd with PPF correction includes all of the rate adjustments from the basic scheme (i.e. updates of the type in Equation (16)) plus extra adjustments based on routing vector information received from the other sources. In particular, after each basic multipath-aimd rate adjustment, each source i will engage in a PPF correction step as follows. ( x ij x ij x ii x ii +X P maxfx ij ; K 0g if m l6=i li > 0 otherwise, j6=i (20) minfk x ij g (21) where K>0 is the additive PPF correction parameter. Thus, if source i is making use of the secondary LSP j 6= i and if LSP i is receiving secondary flow from some other source, then source i will reduce traffic on the secondary LSP j by K and, at the same time, increase its traffic to the primary LSP i by K. Equations (20) and (21) have the effect of reducing flow along chains or cycles of source-path pairs with unnecessary secondary path flow. In fact, the PPF correction is inspired from the secondary path reduction scheme discussed in Section 3, which involves breaking chains or cycles of source-path pairs that satisfy either Case 1 or 2 from Section 3. By reducing the total flow along each chain or cycle with unnecessary secondary path utilization, the PPF correction creates the opportunity for subsequent basic multipath-aimd rate adjustments to modify the solution toward efficiency, fairness, and PPF-optimality. Unfortunately, while the PPF correction creates this opportunity, it does not represent a complete solution. The basic problem is that the PPF correction tends to push flow onto primary paths, interfering with the natural tendency of AIMD to arrive at a fair distribution of the load. In fact, the basic multipath-aimd rate adjustment (see Equation (16)) and the PPF correction (see Equations (20)-(21)) tend to compete with one another as the system evolves to a final rate allocation. In practice, one must be careful in choosing values for k a k r and K. IfK is large compared to k a and k r, then the PPF correction will dominate, and the resulting rate allocation will show low utilization on the secondary paths, but may also be quite far from the fairshare rate allocation. The simulation results in Section 5 illustrate this tradeoff. 5 Simulation Results Here we present ns-2 [1] simulation results to evaluate multipath-aimd as applied to an MPLS network with five sources and five LSPs. In Section 5.1 we present results for the

13 PfHSN basic multipath-aimd algorithm, and in Section 5.2 we present results for the revised algorithm, multipath-aimd with PPF correction. Our simulations indicate that (1) the basic algorithm achieves an efficient and fair allocation of capacities to sources, (2) the basic algorithm yields a PPF-optimal solution in the case of owned resources, and (3) the revised algorithm, multipath-aimd with PPF correction, can reduce secondary path utilization in the pooled resources case at the expense of reduced fairness. S1 S2 S3 S4 I1 I2 I3 I4 B1 B2 B3 B4 Throughput (bps) 7 x Source 1 Source 2 Source 3 Source 4 Source 5 S5 I5 B Time index, t (s) Fig. 3. Simulated network topology. Fig. 4. Experiment 1 - Basic multipath- AIMD applied with greedy sources and pooled resources. Initial Scenario, t 2 [0 80) sec Final Scenario, t 2 [80 200) sec Source Load Throughput, i Throughput, i Load Throughput, i Throughput, i Capacity i i (Pooled) (Owned) i (Pooled) (Owned) of LSP i Table 1. Experiment 2 - Predicted efficient and fair rate allocations for the pooled and owned cases. The predictions are based on the results from Sections 2 and 3. All values are expressed in Mbps. Note that the desired sending rate for Source 2 changes from 30 to 50 at time t =80sec. Experimental Setup. Figure 3 illustrates the topology of the MPLS network simulated in ns-2. The nodes S1, S2, S3, S4, and S5 are source nodes and I1, I2, I3, I4 and I5 are ingress nodes of an MPLS network. The LSPs associated with the ingress nodes have bandwidths (B i j i =1 ::: 5) = (50, 40, 30, 30, 30) Mbps. We modified the ns-2 code in two ways. First, ingress nodes periodically send feedback messages to the sources indicating the congestion state of the corresponding LSPs, as described in Section 4. Second, source nodes generate CBR traffic with a rate specified by our multipath-aimd scheme in response to the received feedback messages. The bandwidth and propagation delay for each link between the source nodes and the ingress

14 14 PfHSN 2002 nodes are set to 100 Mbps and 5 ms, respectively. Resources send congestion feedback every LSP =5ms. Sources update their sending-rates every src =5ms. For the experiments involving multipath-aimd with PPF correction, the topology of Figure 3 is augmented to include full-duplex links between all source pairs, with bandwidth and propagation delay of 100 Mbps and 1 ms, respectively. Sources exchange binary routing vectors every PPF =5ms. All packets in the simulation are 50 bytes in length and are treated as UDP packets (i.e. no flow control). Finally, for all experiments in this section, we set k a = :1 Mbps and k r = :01 as values for the additive increase and multiplicative decrease parameters, respectively. 5.1 Basic Multipath-AIMD Experiment 1: Basic Multipath-AIMD with Greedy Sources and Pooled Resources. Figure 4 shows the outcome from basic multipath-aimd applied to the case of greedy sources and pooled resources. The plot shows the evolution of the throughput i achieved by each source i. Note that all sources converge within 90 seconds to a throughput of 36 Mpbs, the fair-share allocation for this case. We point out that the final routing matrix achieved by basic multipath-aimd is not PPF-optimal. The total volume of secondary traffic inthefinal resource allocation (which is not shown in a graph) is Mbps. This is much larger than the fair PPF-optimal allocation which requires only 18 Mbps of traffic on secondary paths. Throughput (bps) 7 x 107 Source Source 2 Source 1 Source 5 Source 3 Throughput (bps) 7 x Source 2 Source 4 Source 3 Source 1 Source Time index, t (s) Time index, t (s) Fig. 5. Experiment 2 - Basic Multipath- AIMD applied to the case of pooled resources. Fig. 6. Experiment 2 - Basic Multipath- AIMD applied to the case of owned resources. Experiment 2: Basic Multipath-AIMD with Non-Greedy Sources. Here we consider the case of non-greedy sources, and we apply the basic algorithm, where the capacities of the paths are either pooled or owned. In this experiment, the desired sending rates ( i j i =1 ::: 5) for the sources all start out at values (10, 30, 50, 60, 30) Mbps. At time t = 80 sec, source 2 switches its desired sending rate from 2 = 30 Mbps to 50 Mbps. The theoretical fair-shares for all sources (before and after the switch) are shown in Table 1, with results for both the pooled and user-owned cases. Figures 5 and 6 illustrate the evolution of the algorithm in terms of throughput achieved by each source. The results in Figure 5 apply to the case of pooled resources, whereas Figure 6

15 PfHSN describes the outcome for owned resources. In both figures the throughput values for each source converge to the appropriate theoretic fair-share value listed in Table 1, both before and after the switch in 2 at t = 80 sec. As before, the figures do not indicate the total volume of secondary traffic associated with the final routing matrices at t = 200 sec. It turns out that the final solution for the pooled resources is not PPFoptimal, with a total volume of secondary path traffic equals to Mbps which is larger than the PPD-optimal value of 40 Mbps for the corresponding fair rate allocation for pooled resources. On the other hand, the final solution for the owned case is PPFoptimal, achieving the optimal secondary path utilization value of 40 Mbps for the fair allocation to owned resources. 5.2 Multipath-AIMD with PPF Correction In this subsection, we present results from two experiments where we apply the revised algorithm, multipath-aimd with PPF correction, to an MPLS network with non-greedy sources and pooled resources. In both experiments, the desired sending rates ( i j i = 1 ::: 5) are (10, 50, 50, 60, 30) Mbps, and the corresponding fair-share rate allocation appears under the Final Scenario heading in Table 1. In Experiment 3, we set the PPF correction parameter K to a very small numerical value, K = :00001 Mbps, which, like basic multipath-aimd, results in a fair but PPF-suboptimal routing matrix. In Experiment 4, we set the PPF correction parameter more aggressively, K = :01 Mbps, resulting in a final routing matrix which is PPF-optimal. Here, however, the corresponding rate allocation deviates from the fair-share rate allocation predicted in Table 1. 7 x x Source 2 Source 3 Source 4 6 Throughput (bps) Source 1 Source 5 Secondary Traffic (bps) Source 2 Source 3 Source 4 Source 1 Source Time index, t (s) Time index, t (s) Fig. 7. Experiment 3 - Throughput achieved by multipath-aimd with PPF correction (K = :00001 Mbps). Fig. 8. Experiment 3 - Secondary traffic achieved by multipath-aimd with PPF correction (K = :00001 Mbps). Experiment 3: Multipath-AIMD with PPF correction with K = :00001 Mbps. The results of this experiment are shown in Figures 7 and 8. Figure 7 shows the evolution of throughput for each of the five sources. The network settles within 25 seconds to a rate allocation consistent with the predicted values in Table 1. Figure 8 shows the total allocation of each source to secondary paths. Note that the final routing matrix results in Mbps total secondary traffic, which is larger than the PPF-optimal value of

16 16 PfHSN 2002 Throughput (bps) 7 x 107 Source 4 6 Source 2 Source Source 1 Source 5 Secondary Traffic (bps) 7 x Source 4 Source Time index, t (s) 1 Source 1 Source 2 Source Time index, t (s) Fig. 9. Experiment 4 - Throughput achieved by multipath-aimd with PPF correction (K = :01 Mbps). Fig. 10. Experiment 4 - Secondary traffic achieved by multipath-aimd with PPF correction (K = :01 Mbps). 40 Mbps. Evidently, because K is so small, the PPF correction in this experiment does not have much impact in guiding the system to a PPF-optimal routing matrix. Experiment 4: Multipath-AIMD with PPF correction with K = :01 Mbps. Here we apply the revised algorithm, multipath-aimd with PPF correction, to the same problem as in Experiment 3, with a more aggressive value for the PPF correction parameter, K = :01 Mbps. The results are shown in Figures 9 and 10. The evolution of throughput i for each of the five sources appears in Figure 9. We observe that the final rate allocation deviates from the predicted allocation from Table 1, especially with regard to sources 2, 3, and 4. Thus, the PPF correction causes the system to evolve to an unfair distribution of path resources. On the other hand, the final routing matrix is PPF-optimal with respect to the final rate allocation. This can be seen in Figure 10 which shows the evolution of secondary traffic allocated by each of the five sources. Note that the final routing matrix involves a 40 Mbps total secondary traffic, which is PPF-optimal for the rate allocation given in Figure 9. 6 Conclusions and Future Work We have studied the problem of allocating LSP resources in an MPLS network. Our network model assumes that each traffic source has a primary path and may utilize the capacity of other, secondary, paths. We accommodate both greedy and non-greedy traffic sources and allow the capacity of each LSP to be considered as either a shared ( pooled ) resource or as a resource owned by the corresponding traffic source. With regard to the allocation of resources, we have defined fairness criteria based on the notion of fair-share allocation in [3], with special consideration as to whether the resources are pooled or owned. In addition to the fairness criteria, we have also introduced a secondary objective, the PPF criterion, to be achieved in the final allocation of resources. The PPF criterion is defined with respect to a given throughput allocation as an optimization model where the objective is to minimize the total volume of traffic sent along secondary paths. We provide a characterization of the PPF solution in terms of the existence of secondary path chains and cycles, and in principle this provides an

17 PfHSN algorithm that can minimize the total volume of secondary path traffic without affecting the throughput of each source. To achieve a fair and PPF-optimal rate allocation in a distributed fashion, we propose multipath-aimd as an extension to the earlier work of [13]. Multipath-AIMD comes in two flavors: (1) basic multipath-aimd, which seeks to provide a fair allocation of throughput to each source, without special consideration of the PPF criterion, and (2) multipath-aimd with PPF correction, which augments the basic algorithm to reduce the volume of secondary path traffic. Both algorithms rely upon binary feedback information regarding the congestion state of each of the LSPs and, for the second version of the algorithm, a binary routing vector associated with each source. Simulation experiments with multipath-aimd show that the basic algorithm converges to an efficient and fair allocation of resources and also yields a PPF-optimal solution in the case of owned resources. The revised algorithm, multipath-aimd with PPF correction, can reduce secondary path utilization (for the pooled resources case) at the expense of fairness. From the perspective of Internet traffic engineering, multipath-aimd seems to provide a practical mechanism for improving the utilization of LSP resources, while maintaining fairness and minimizing the complexity associated with multipath routing. This paper presents a step towards a definition of traffic engineering criteria for MPLS networks. While these initial results are promising, there are limitations to our model which must be addressed in subsequent research. First, we assume that all sources have access to all LSPs, which is clearly unrealistic in many networking contexts. This is more than an assumption of convenience, since the appropriate notion of fairness for the case where each source has access to a subset of the resources is somewhat unclear. A second limitation of our network model is that it assumes that the flows along LSPs do not interact. While it is possible to rationalize the simplified model of Figure 2, future work in this area should address the full set of interactions possible in Figure 1. References 1. ns-2 network simulator O. Aboul-Magd, L. Andersson, and P. Ashwood-Smith. Constraint-based LSP setup using LDP txt, February I. F. Akyildiz, J. Liebeherr, and A. Tantawi. DQDB+/-: A fair and waste-free media access protocol for dual bus metropolitan networks. IEEE Transactions on Communications, 41(12): , December D. O. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao. Overview and principles of Internet traffic engineering. principles- 02.txt, November F. Bonomi and W. Fendick. The Rate-Based Flow Control Framework for the Available Bit Rate ATM Service. IEEE Network, 9(2):25 39, March/April D. Chiu and R. Jain. Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks. Computer Networks and ISDN Systems, 17:1 14, A. Elwalid, C. Jin, S. Low, and I. Widjaja. MATE: MPLS adaptive traffic engineering. In Proceedings of IEEE INFOCOM 2001, volume 3, pages , 2001.

18 18 PfHSN D. O. Awduche et. al. RSVP-TE: Extensions to RSVP for LSP tunnels. tunnel-09.txt, August P. Hurley, J.-Y. Le Boudec, and P. Thiran. A note on the fairness of additive increase and multiplicative decrease. In Proceedings of ITC-16, Edinburgh, UK, June V. Jacobson. Congestion avoidance and control. In Proceedings of ACM Sigcomm 88, August, 1988, pages , R. Jain. Congestion control and traffic management in ATM networks: Recent advances and a survey. Computer Networks and ISDN Systems, 28(13): , October R. Jain and K. K. Ramakrishnan. Congestion avoidance in computer networks with a connectionless network layer: Concepts, goals and methodology. Proceedings of the Computer Networking Symposium; IEEE; Washington, DC, pages , R. Jain, K. K. Ramakrishnan, and D.-M. Chiu. Congestion avoidance in computer networks with a connectionless network layer. December Digital Equipment Corporation, Technical Report DEC-TR F. P. Kelly. Charging and rate control for elastic traffic. European Transactions on Telecommunications, 8:33 37, F. P. Kelly, A. K. Maulloo, and D. K. H. Tan. Rate control for communication networks: Shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49: , S. Kunniyur and R. Srikant. End-to-end congestion control: Utility functions, random losses and ECN marks. In Proceedings of IEEE INFOCOM 2000, pages , March K.-W. Lee, T.-E. Kim, and V. Bharghavan. A comparison of end-to-end congestion control algorithms: the case of AIMD and AIPD. In Proceedings of IEEE Globecom 2001, San Antonio, Texas, November L. Massoulie and J. Roberts. Bandwidth sharing: Objectives and algorithms. In Proceedings IEEE INFOCOM 1999, New York, March K. K. Ramakrishnan and R. Jain. A Binary Feedback Scheme for Congestion Avoidance in Computer Networks. ACM Transactions on Computer Systems, 8(2): , E. Rosen, A. Viswanathan, and R. Callon. Multiprotocol label switching architecture. draftietf-mpls-arch-07.txt, ftp://ftp.isi.edu/in-notes/rfc3031.txt, January M. Vojnovic, J.-Y. Le Boudec, and C. Boutremans. Global fairness of additive-increase and multiplicative-decrease with heterogeneous round-trip times. In Proceedings of IEEE INFOCOM 2000, volume 3, pages , 2000.

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Supporting End-to-End QoS in DiffServ/MPLS Networks

Supporting End-to-End QoS in DiffServ/MPLS Networks Supporting End-to-End QoS in DiffServ/MPLS Networks Ji-Feng Chiu, *Zuo-Po Huang, *Chi-Wen Lo, *Wen-Shyang Hwang and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University, Taiwan

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh adrian@wshlab2.ee.kuas.edu.tw, gary@hpds.ee.ncku.edu.tw,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks Journal of Computer Science 4 (3): 232-238, 2008 ISSN 1549-3636 2008 Science Publications Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks 1 G. Murugesan, 2 A.M.

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department

More information

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

How To Share Bandwidth On A Diffserv Network

How To Share Bandwidth On A Diffserv Network Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware

More information

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

VoIP versus VoMPLS Performance Evaluation

VoIP versus VoMPLS Performance Evaluation www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Optimization models for congestion control with multipath routing in TCP/IP networks

Optimization models for congestion control with multipath routing in TCP/IP networks Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

A New Forwarding Policy for Load Balancing in Communication Networks

A New Forwarding Policy for Load Balancing in Communication Networks A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France Martin.Heusse@enst-bretagne.fr Abstract We present in this

More information

Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS

Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS Melody Moh moh @IX. sjsu. edu Dept of Math. & Computer Science Belle Wei bwei@email.sjsu.edu Dept of Electrical Engineering

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

Acknowledgements Our Team Members Our Sponsors

Acknowledgements Our Team Members Our Sponsors Acknowledgements Our Team Members: Shivkumar Kalyanaraman Ram Viswanathan Rohit Goyal Sonia Fahmy Fang Lu Our Sponsors: Intel Stratacom NASA 2 Overview Why worry about congestion in high speed networks?

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Khondaker M. Salehin and Roberto Rojas-Cessa Networking Research Laboratory Department of Electrical and Computer Engineering

More information

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA hhussei1@gmu.edu

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

OPNET simulation of voice over MPLS With Considering Traffic Engineering

OPNET simulation of voice over MPLS With Considering Traffic Engineering Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing

More information

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE) 1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)

More information

A Load Balancing Scheme for Congestion Control in MPLS Networks

A Load Balancing Scheme for Congestion Control in MPLS Networks A Load Balancing Scheme for Congestion Control in MPLS Networks Elio Salvadori, Roberto Battiti UniversitàdiTrento Dipartimento di Informatica e Telecomunicazioni via Sommarive 14, 38050 Povo (TN), Italy

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

Disjoint Path Algorithm for Load Balancing in MPLS network

Disjoint Path Algorithm for Load Balancing in MPLS network International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Router-assisted congestion control. Lecture 8 CS 653, Fall 2010

Router-assisted congestion control. Lecture 8 CS 653, Fall 2010 Router-assisted congestion control Lecture 8 CS 653, Fall 2010 TCP congestion control performs poorly as bandwidth or delay increases Shown analytically in [Low01] and via simulations Avg. TCP Utilization

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

Dynamic Sizing of Label Switching Paths in MPLS Networks

Dynamic Sizing of Label Switching Paths in MPLS Networks Dynamic Sizing of Label Switching Paths in MPLS Networks Gustavo B. Figueiredo 1 José. Augusto. S. Monteiro 2 Nelson. L. S da Fonseca 1 Antônio. A. A. Rocha 3 1 State University of Campinas Institute of

More information

Project Report on Traffic Engineering and QoS with MPLS and its applications

Project Report on Traffic Engineering and QoS with MPLS and its applications Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to

More information

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

PAPER Flow-level multipath load balancing in MPLS network

PAPER Flow-level multipath load balancing in MPLS network IEICE TRANS.?? VOL.Exx?? NO.xx XXXX 2x PAPER Flow-level multipath load balancing in MPLS network Zenghua ZHAO a) Yantai SHU Lianfang ZHANG and Oliver YANG b) Nonmembers SUMMARY Multi-Protocol Label Switching

More information

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering * 1 Zahra Vali, 2 Massoud Reza Hashemi, + 3 Neda Moghim 1, Isfahan University

More information

RSVP- A Fault Tolerant Mechanism in MPLS Networks

RSVP- A Fault Tolerant Mechanism in MPLS Networks RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data

More information

Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing

Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China mingui.zhang@gmail.com Bin Liu Tsinghua University Beijing, China liub@tsinghua.edu.cn

More information

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq

More information

Policy-Based Fault Management for Integrating IP over Optical Networks

Policy-Based Fault Management for Integrating IP over Optical Networks Policy-Based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho 1, Edmundo Madeira 1, Fábio Verdi 2, and Maurício Magalhães 2 1 Institute of Computing (IC-UNICAMP) 13084-971 Campinas,

More information

A generic weight-proportional bandwidth sharing policy for ATM ABR service

A generic weight-proportional bandwidth sharing policy for ATM ABR service Performance Evaluation 38 (1999) 21 44 A generic weight-proportional bandwidth sharing policy for ATM ABR service Yiwei Thomas Hou a,,1, Henry Tzeng b, Shivendra S. Panwar c, Vijay P. Kumar b a Fujitsu

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.

More information

Online Traffic Engineering using Least Interference Optimization

Online Traffic Engineering using Least Interference Optimization Online Traffic Engineering using Least Interference Optimization A.B Bagula, M. Botha, and A.E Krzesinski Department of Computer Science University of Stellenbosch, 7 Stellenbosch, South Africa Tel: +27

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

A MIXED-METRIC ROUTING WITH OPTIMAL FLOW DISTRIBUTION FOR MPLS NETWORKS

A MIXED-METRIC ROUTING WITH OPTIMAL FLOW DISTRIBUTION FOR MPLS NETWORKS Journal of Engineering Sciences, Assiut University, Vol. 33, No.1, pp. 159-172, January 2006 A MIXED-METRIC ROUTING WITH OPTIMAL FLOW DISTRIBUTION FOR MPLS NETWORKS Associate Professor at Communications

More information

Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem

Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem Christopher M. Kellett, Robert N. Shorten, and Douglas J. Leith Abstract Recent work in sizing Internet router buffers has

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS

TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS AThesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment

More information

Performance Evaluation for VOIP over IP and MPLS

Performance Evaluation for VOIP over IP and MPLS World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information

More information

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

QoS Implementation For MPLS Based Wireless Networks

QoS Implementation For MPLS Based Wireless Networks QoS Implementation For MPLS Based Wireless Networks Subramanian Vijayarangam and Subramanian Ganesan Oakland University, Rochester, Michigan Abstract : Voice has been the primary application in wireless

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset

More information

Parallel LSPs for constraint-based routing and load balancing in MPLS networks

Parallel LSPs for constraint-based routing and load balancing in MPLS networks Parallel LSPs for constraint-based routing and load balancing in MPLS networks J. Tang, C.K. Siew and G. Feng Abstract: Two features of multiprotocol label switching are very useful in network traffic

More information

TCP Trunking for Bandwidth Management of Aggregate Traffic

TCP Trunking for Bandwidth Management of Aggregate Traffic TCP Trunking for Bandwidth Management of Aggregate Traffic H.T. Kung kung@eecs.harvard.edu Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138, USA S.Y. Wang shieyuan@csie.nctu.edu.tw

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

LOAD BALANCING IN MPLS

LOAD BALANCING IN MPLS LOAD BALANCING IN MPLS Prabhjot Kaur, Satish Devane Datta Meghe College of Engineering, Navi Mumbai, Maharashtra, India ABSTRACT MPLS is a mechanism in high-performance telecommunications network that

More information

VOL. 3, NO. 3, March 2012 ISSN 2079-8407. Journal of Emerging Trends in Computing and Information Sciences 2009-2012 CIS Journal. All rights reserved.

VOL. 3, NO. 3, March 2012 ISSN 2079-8407. Journal of Emerging Trends in Computing and Information Sciences 2009-2012 CIS Journal. All rights reserved. New Bandwidth Guaranteed QoS Routing Algorithm for MPLS Networks 1 Santosh Kulkarni, 2 Reema Sharma, 3 Ishani Mishra 1 HOD, Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Assistant Professor,

More information